summaryrefslogtreecommitdiff
path: root/include/linux/security.h
AgeCommit message (Expand)AuthorFilesLines
2008-12-20security: pass mount flags to security_sb_kern_mount()James Morris1-3/+3
2008-12-04Merge branch 'master' into nextJames Morris1-4/+8
2008-12-03nfsd: fix vm overcommit crash fix #2Junjiro R. Okajima1-4/+8
2008-11-14CRED: Allow kernel services to override LSM settings for task actionsDavid Howells1-0/+28
2008-11-14CRED: Make execve() take advantage of copy-on-write credentialsDavid Howells1-66/+37
2008-11-14CRED: Inaugurate COW credentialsDavid Howells1-96/+82
2008-11-14CRED: Pass credentials through dentry_open()David Howells1-3/+4
2008-11-14CRED: Detach the credentials from task_structDavid Howells1-13/+13
2008-11-14CRED: Constify the kernel_cap_t arguments to the capset LSM hooksDavid Howells1-20/+24
2008-11-14CRED: Neuter sys_capset()David Howells1-32/+16
2008-11-11Add a new capable interface that will be used by systems that use audit toEric Paris1-3/+13
2008-10-30nfsd: fix vm overcommit crashAlan Cox1-0/+6
2008-08-28securityfs: do not depend on CONFIG_SECURITYEric Paris1-24/+30
2008-08-17security.h: fix build failureAlexander Beregalov1-1/+1
2008-08-14security: Fix setting of PF_SUPERPRIV by __capable()David Howells1-14/+25
2008-07-27[PATCH] pass MAY_OPEN to vfs_permission() explicitlyAl Viro1-4/+3
2008-07-24security: remove unused forwardsHugh Dickins1-2/+0
2008-07-14security: remove register_security hookJames Morris1-10/+0
2008-07-14security: remove unused sb_get_mnt_opts hookMiklos Szeredi1-14/+0
2008-07-14LSM/SELinux: show LSM mount options in /proc/mountsEric Paris1-0/+9
2008-07-14Security: split proc ptrace checking into read vs. attachStephen Smalley1-5/+11
2008-04-30Security: Make secctx_to_secid() take const secdataDavid Howells1-3/+3
2008-04-29keys: add keyctl function to get a security labelDavid Howells1-1/+19
2008-04-29xattr: add missing consts to function argumentsDavid Howells1-20/+23
2008-04-28Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmo...Linus Torvalds1-449/+449
2008-04-28capabilities: implement per-process securebitsAndrew G. Morgan1-7/+9
2008-04-28SELinux: include/security.h whitespace, syntax, and other cleanupsEric Paris1-449/+449
2008-04-22[PATCH] switch a bunch of LSM hooks from nameidata to pathAl Viro1-26/+26
2008-04-19Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmo...Linus Torvalds1-1/+113
2008-04-19Security: Introduce security= boot parameterAhmed S. Darwish1-0/+12
2008-04-19LSM/Audit: Introduce generic Audit LSM hooksAhmed S. Darwish1-0/+72
2008-04-19LSM: Introduce inode_getsecid and ipc_getsecid hooksAhmed S. Darwish1-1/+29
2008-04-13LSM: Make the Labeled IPsec hooks more stack friendlyPaul Moore1-24/+24
2008-03-20file capabilities: remove cap_task_kill()Serge Hallyn1-2/+1
2008-03-06LSM/SELinux: Interfaces to allow FS to control mount optionsEric Paris1-25/+74
2008-02-05capabilities: introduce per-process capability bounding setSerge E. Hallyn1-5/+0
2008-02-05VFS/Security: Rework inode_getsecurity and callers to return resulting bufferDavid P. Quigley1-12/+9
2008-01-25security/selinux: constify function pointer tables and fieldsJan Engelhardt1-1/+1
2008-01-25security: add a secctx_to_secid() hookDavid Howells1-0/+13
2008-01-25security: remove security_sb_post_mountroot hookH. Peter Anvin1-8/+0
2008-01-25Security: add get, set, and cloning of superblock security informationEric Paris1-0/+36
2007-10-20fix up security_socket_getpeersec_* documentationSerge Hallyn1-2/+15
2007-10-19V3 file capabilities: alter behavior of cap_setpcapAndrew Morgan1-0/+7
2007-10-17security/ cleanupsAdrian Bunk1-15/+0
2007-10-17Implement file posix capabilitiesSerge E. Hallyn1-4/+36
2007-10-17security: Convert LSM into a static interfaceJames Morris1-984/+206
2007-10-17SELinux: Improve read/write performanceYuichi Nakamura1-0/+18
2007-08-23fix NULL pointer dereference in __vm_enough_memory()Alan Cox1-5/+15
2007-07-12security: Protection for exploiting null dereference using mmapEric Paris1-5/+12
2007-05-09Fix occurrences of "the the "Michael Opdenacker1-1/+1